Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure(PKI)methods.The limited computing resources,the disconnection ...Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure(PKI)methods.The limited computing resources,the disconnection network,the classification requirements of identification,the requirement of trust transfer and cross identification,the bidirectional identification,the security delegation and the privacy protection etc are all these unsolved problems.In this paper,UCIMssp,a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer(P2P)is presented.SPKI-based authorization is exploited in UCIMssp to solve the above problems in the small-scale ubiquitous computing environment.The DHT and flooding technology of P2P overlay network over the Internet is expanded to solve the routing search in the large-scale ubiquitous computing environment.The architecture of ubiquitous computing environment,the validation of identification requisition,the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper.The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.展开更多
基金Supported by the Ministry of Educationin China(No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure(PKI)methods.The limited computing resources,the disconnection network,the classification requirements of identification,the requirement of trust transfer and cross identification,the bidirectional identification,the security delegation and the privacy protection etc are all these unsolved problems.In this paper,UCIMssp,a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer(P2P)is presented.SPKI-based authorization is exploited in UCIMssp to solve the above problems in the small-scale ubiquitous computing environment.The DHT and flooding technology of P2P overlay network over the Internet is expanded to solve the routing search in the large-scale ubiquitous computing environment.The architecture of ubiquitous computing environment,the validation of identification requisition,the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper.The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.
基金Supported by the Ministry of Educationin China (No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.